Profile

Cover photo
Shawn Tuma
Works at Scheef & Stone, L.L.P.
Attended Regent University
Lived in Pineville, Louisiana
820 followers|107,243 views
AboutPostsPhotosYouTube+1's

Stream

Shawn Tuma

Shared publicly  - 
 
Consider these three points before discussing the Target consumer breach settlement with other leaders
1
Add a comment...
 
A Few Thoughts on the Consumer Litigation Settlement in the Target Data Breach Case
1
Add a comment...
 
Many thanks to CSO Online and Michael Santarcangelo (@catalyst) for his excellent synopsis of our conversation regarding the recent settlement of the Consumer Litigation in the Target data breach lawsuit (note, the more substantive Financial Institutions…
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Every Company is an Internet Company Now (Jason Smith, Circuits – Vol 2: Fall 2014) +Jason Smith 
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Thanks +Michael Santarcangelo for mentioning me in this excellent article (as I have come to expect from you!). 
Consider these three points before discussing the Target consumer breach settlement with other leaders
4
3
Bert Knabe's profile photoRick Ross's profile photo
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Trade Secrets in the Cloud by +Patrick Keating in Volume 2: Fall 2014 issue of Circuits, a publication of the +Computer & Technology Section - State Bar of Texas 
1
Add a comment...
Have him in circles
820 people
Grant Wickes's profile photo
Ryan Zehl's profile photo
Steven Habuda's profile photo
Daniel Barrera's profile photo
Bob Friedenthal's profile photo
Ballard Law, PLLC's profile photo
J Morgan Hargrove's profile photo
Richard Shea's profile photo
S. Joshua Macktaz's profile photo

Shawn Tuma

Shared publicly  - 
 
 
In a recent survey of security professionals conducted at the e-Crime Congress, 16% of respondents said they support laws that would result prison sentences for executives and Boards of Directors for any negligence on their part following a major data... #boardofdirectors #conviction #databreach
3 comments on original post
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Legal Risks of Wearable Technology (John Browning, Circuits – Vol 2: Fall 2014)
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Preserving Google Content for Dummies
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
1
Add a comment...

Shawn Tuma

Shared publicly  - 
1
David Dickens's profile photo
 
IANAL but, I don't see how non-transferable licenses are by definition a restraint against secondary markets. Wasn't this what Microsoft tried to pull claiming that if you sold your computer you couldn't see the copy of Windows installed on it because it was non-transferable. I'm quite sure there are some cases or legislation covering this, folks just aren't seeing the connection between the old Windows licenses and the new iTunes ones.
Add a comment...
People
Have him in circles
820 people
Grant Wickes's profile photo
Ryan Zehl's profile photo
Steven Habuda's profile photo
Daniel Barrera's profile photo
Bob Friedenthal's profile photo
Ballard Law, PLLC's profile photo
J Morgan Hargrove's profile photo
Richard Shea's profile photo
S. Joshua Macktaz's profile photo
Education
  • Regent University
    Law, 1996 - 1999
  • Northwestern State University
    Political Science & History, 1993
Basic Information
Gender
Male
Looking for
Friends, Networking
Relationship
Married
Other names
Shawn E. Tuma
Story
Tagline
Attorney | Expertise in emerging digital information law areas of Computer Fraud, Data Security, Privacy & Social Media Law | blogger, author, and speaker.
Introduction
I am an experienced business, litigation, and intellectual property attorney who helps businesses assess, avoid, and resolve problems including those with emerging digital information law issues such as computer fraud, data breach, privacy and social media legal issues with a strong emphasis on the Computer Fraud and Abuse Act.  I am a devoted Christian, husband, father, author & speaker. Despite being a lawyer, I am actually guided by principles!  My practice has a strong focus on the Computer Fraud and Abuse Act. I counsel business clients on how to avoid trouble on these issues and, should they find themselves in trouble, help them resolve the issues in the most expeditious and efficient way possible, which is where my extensive litigation training and skills become very helpful.  I am also a blogger, author, and speaker. I am very thankful to be blessed with a wonderful family, friends, career, and life in general. I love God, my family, my career and the opportunities I have to continue growing and learning while helping others. You can visit my personal website / blog (www.shawnetuma.com) to learn more about who I am Personally and Professionally, as well as my Professional Philosophy. Also note that Google does not use my middle initial but most of my professional activities are listed with my name as Shawn E. Tuma so if you're searching for something and are doing a search, use that full name as well.
Bragging rights
I am married to the most wonderful woman in the world, Rachel Tuma, and have the 5 most amazing children anyone could ever ask for: Katherine, Clara, Christopher, Andrew and Seth! I am truly blessed!
Work
Occupation
Computer Fraud, Computer Fraud and Abuse Act, Privacy, Data Breach, Technology, Litigation & Business Adviser and Attorney
Employment
  • Scheef & Stone, L.L.P.
    Partner, 2014 - present
  • BrittonTuma
    Partner, 2011 - 2014
  • Winstead
    2000 - 2007
  • Shamoun & Norman
    2007 - 2009
  • Winstead PC
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Previously
Pineville, Louisiana - Baton Rouge, Louisiana - Natchitoches, Louisiana - Virginia Beach, Virginia - The Colony, Texas
Contact Information
Home
Mobile
(214) 726-2808
Email
Work
Phone
(214) 472-2135
Email
Address
2600 Network Blvd., Suite 400 Frisco, Texas 75034
Apps with Google+ Sign-in
Shawn Tuma's +1's are the things they like, agree with, or want to recommend.
Marriott Customers’ Personal Details Exposed by Simple Web Flaw
thecybersecuritysentinel.blogspot.com

From Tripwire's State of Security Blog: Marriott Customers’ Personal Details Exposed by Simple Web Flaw Here’s a piece of advice for anyone

Boards Not Regularly Briefed on Cyber-Security: Survey | SecurityWeek.Com
www.securityweek.com

Boards of directors may have authority over the business, but they may be among the last to know about the security risks facing their organ

Cyber crime is a threat to global economy, says researcher
www.computerweekly.com

Halting cyber crime could have a positive impact on the global economy, says Halting cyber crime could have a positive impact on the global

5 questions to ask before a breach happens | CSO Online
www.csoonline.com

Use these five questions to start the conversations necessary to 'assume breach' and plan ahead.

Forum selection clause in browsewrap agreement did not bind parties in b...
blog.internetcases.com

internet technology intellectual property attorney Evan Brown Chicago lawyer copyright trademark domain names UDRP DMCA data privacy

When Your Marquis Client Gets Hacked
blog.wh1t3rabbit.net

There are people who will tell you that all PR is good PR. In my years in security I have seen both sides of that debate true. Lately though

Visual Hacking is High Tech Shoulder Surfing
robertsiciliano.com

A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over y

Law firms face cybersecurity audits by banking clients; are they a 'weak...
www.abajournal.com

Banks are increasingly scrutinizing their law firms’ cybersecurity efforts, including the law firms’ protection of confidential information

LEGAL WRITING: STYLE vs. STRATEGY | LinkedIn
www.linkedin.com

PART 1 OF 3: The 3 A's There are no TV shows about legal writers. No one ever got to see Perry Mason or Matlock crank out a brief or write a

Seth's Blog: Good advice...
sethgodin.typepad.com

is priceless. Not what you want to hear, but what you need to hear. Not imaginary, but practical. Not based on fear, but on possibility. Not

Unauthorized
www.privacyassociation.org

Already a member? You must be logged in to access this content. Log in now to proceed. Not an IAPP member? It's easy and affordable to becom

2 Questions to See if Your Company is at Risk of a Data Breach
us3.campaign-archive.com

2 Simple Questions to Determine if Your Business is at Risk of Data Breach. 1. Does your business have digital information about others that

Shawn Tuma ('99)
www.regentalumni.org

Shawn Tuma (Law, '99) is in the private practice of law that focuses on cutting-edge cyber, technology, and digital information law which in

Final closing the sale asking for business
www.slideshare.net

Slides from coaching program on how to attract business and close the sale

Seth's Blog: The cure or the story?
sethgodin.typepad.com

The plumber, the roofer and the electrician sell us a cure. They come to our house, fix the problem, and leave. The consultant, the doctor (

WiFi Security Truths and Falsehoods
robertsiciliano.com

Security truths evolve—meaning, they change, and you must keep up with this, particularly with wireless security. Advice for wireless securi

Perfect memory, enhanced vision, an expert golf swing: The future of bra...
online.wsj.com

How soon can we expect to see brain implants for perfect memory, enhanced vision, hypernormal focus or an expert golf swing? We're closer th

8 Stupid Internet Scams That You Still Fall For
www.menshealth.com

Only naïve people fall for online scams, right? Think again

Top 10 Developments/Headlines in Trade Secret, Computer Fraud, and Non-C...
www.tradesecretslaw.com

Trading Secrets A Law Blog on Trade Secrets, Non-Competes, and Computer Fraud. Home · About · Contact · Resources · Webinars · Podcasts · Up